JP2020173482A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2020173482A5 JP2020173482A5 JP2020123590A JP2020123590A JP2020173482A5 JP 2020173482 A5 JP2020173482 A5 JP 2020173482A5 JP 2020123590 A JP2020123590 A JP 2020123590A JP 2020123590 A JP2020123590 A JP 2020123590A JP 2020173482 A5 JP2020173482 A5 JP 2020173482A5
- Authority
- JP
- Japan
- Prior art keywords
- dealer
- key
- user
- secret information
- encrypts
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Claims (1)
前記システムは、ユーザのIDと、秘密情報の分散値を保存するc(=n−(b−1)、b≦k、c<k)個のサーバのIDとを有するディーラと、鍵を有するb−1個の鍵サーバと、を有し、
前記ディーラは、ユーザのIDを前記b−1個の鍵サーバのうちの一部に送信し、
前記b−1個の鍵サーバのうちの一部の各々は、前記ディーラから送信された前記ユーザのIDを、自分の持つ前記鍵で暗号化し、且つ、前記暗号化により得られた値を、前記ディーラに送信し、
前記ディーラは、受信した前記値で、秘密情報を暗号化する、
システム。 It is a system that distributes secret information to n pieces and collects k pieces of distributed values to restore the secret information, and k-1 or less cannot restore the secret information.
The system has a dealer having a user ID and c (= n- (b-1), b≤k, c <k) server IDs for storing the distributed value of confidential information, and a key. b-1 with one key server,
The dealer sends the user's ID to a part of the b-1 key servers.
Each of a part of the b-1 key servers encrypts the user's ID transmitted from the dealer with the key owned by the dealer, and the value obtained by the encryption is used. Send to the dealer
The dealer encrypts the confidential information with the received value.
system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2020123590A JP2020173482A (en) | 2020-07-20 | 2020-07-20 | Dealer, key server, and restoration device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2020123590A JP2020173482A (en) | 2020-07-20 | 2020-07-20 | Dealer, key server, and restoration device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2019148375A Division JP6876340B2 (en) | 2019-08-13 | 2019-08-13 | Dealers, key servers, and restorers |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2020173482A JP2020173482A (en) | 2020-10-22 |
JP2020173482A5 true JP2020173482A5 (en) | 2021-07-26 |
Family
ID=72831313
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2020123590A Pending JP2020173482A (en) | 2020-07-20 | 2020-07-20 | Dealer, key server, and restoration device |
Country Status (1)
Country | Link |
---|---|
JP (1) | JP2020173482A (en) |
-
2020
- 2020-07-20 JP JP2020123590A patent/JP2020173482A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10419404B2 (en) | Enabling comparable data access control for lightweight mobile devices in clouds | |
Li et al. | TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage | |
Yang et al. | Expressive, efficient, and revocable data access control for multi-authority cloud storage | |
Yuan et al. | Efficient public integrity checking for cloud data sharing with multi-user modification | |
US10805076B2 (en) | Information processing apparatus, server apparatus, and computer program product | |
ES2278047T3 (en) | SYSTEM AND PROCEDURE TO PROCESS A SHARED SECRET. | |
JP2013539324A5 (en) | ||
JP6931247B2 (en) | Ciphertext matching systems, methods, and programs | |
JP2012532486A (en) | Method for generating encryption / decryption key | |
Vaanchig et al. | Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation. | |
WO2018235845A1 (en) | Key exchange system and key exchange method | |
Wang et al. | Achieving lightweight and secure access control in multi-authority cloud | |
Yang et al. | Blockchain-assisted secure data sharing protocol with a dynamic multiuser keyword search in IIoT | |
Sudarsono et al. | An implementation of secure wireless sensor network for e-healthcare system | |
JP2020173482A5 (en) | ||
EP3711255A1 (en) | Device, system and method for secure data communication | |
Li et al. | A Proxy Re-Encryption Scheme Based on Elliptic Curve Group. | |
JP2006227411A (en) | Communications system, encryption device, key generator, key generating method, restoration device, communication method, encryption method, and cryptography restoration method | |
Zhang et al. | Group key management protocol for file sharing on cloud storage | |
WO2019142824A1 (en) | Communication device, server device, secret communication system, method thereof, and program | |
JP2018084846A5 (en) | ||
Zhou | Fractal: A new paradigm for high-performance proof-of-stake blockchains | |
Yan et al. | An efficient proof of retrievability scheme for fully homomorphic encrypted data | |
Vijayalakshmi et al. | An efficient security based multi owner data sharing for un-trusted groups using broadcast encryption techniques in cloud | |
Nagarani et al. | A Flexible Access Control with User Revocation in Fog-Enabled Cloud Computing |